Search Results - (( java application server algorithm ) OR ( security classification modeling algorithm ))
Search alternatives:
- security classification »
- classification modeling »
- application server »
- modeling algorithm »
- java application »
- server algorithm »
-
1
Symmetric Key Size for Different Level of Information Classification
Published 2006“…By using this model, we then propose key sizes for different levels of information classification.…”
Get full text
Get full text
Conference or Workshop Item -
2
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
3
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
4
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
6
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
7
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
8
-
9
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
10
Data classification based on confidentiality in virtual cloud environment
Published 2014“…It is very difficult to decide (in cloud) which data need what security and which data do not need security. However it will be easy to decide the security level for data after data classification according to their security level based on the characteristics of the data. …”
Get full text
Get full text
Article -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
13
Improved method of classification algorithms for crime prediction
Published 2014Get full text
Get full text
Conference or Workshop Item -
14
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
15
-
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
18
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
Get full text
Get full text
Thesis -
19
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
20
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
Get full text
Get full text
Conference or Workshop Item
